Application to input a character string

Assignment Help Computer Network Security
Reference no: EM1381223

Use VB to develop an application that will allow the user to input a character string, and produce the following result:

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, "Hello world!" rotated by 2 characters would be: "d!Hello worl".
Output the string rotated left by a user-defined number of characters (0 or more).
Output the string backwards. That means "Hello world!" becomes "!dlrow 0lleH".
Output the number of characters in the string. For example, "Hello world!" has 12 characters.
Output the string with the spaces replaced by underscores. "Hello world!" becomes "Hello_world!"

Program Requirements:
You must center all forms on the screen using a common procedure.
You must use at least one user-defined function and one user-defined SUB procedure.
You need to provide a way to exit the program gracefully.

 

Reference no: EM1381223

Questions Cloud

Calculate the standard deviation of the return : How is an investor's choice of which security to purchase related to his degree of risk aversion and calculate the standard deviation of the return on the security.
Importance of presentation and content in presentation : There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.
Identify potential printer from each company that could meet : Identify potential printers from each company that could meet the requirement. Clarify the warranty coverage and cost.
Total cost of ownership return on investment : Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.
Application to input a character string : Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.
What would you do if you were in a position at nike : What would you do if you were in a position at Nike to decide whether to continue or revise your labor practices in a foreign country?
Question about program consistency : Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?
How do managers generally describe organizational authority : What five methods have traditionally been used to departmentalize work and workers? Give one advantage and one disadvantage of each. How do managers generally describe organizational authority?
Effective biometric systems : Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Describe what security threats in installing wireless lan

Write a two- page letter to describe what security threats she is facing and how she can decraese these threats. Remember that you are writing for friend, not for a teacher.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd